- 22 Oct, 2022 2 commits
-
-
Thanks to @kees
Alexander Popov authored -
Alexander Popov authored
-
- 13 Oct, 2022 6 commits
-
-
Thanks to @kees
Alexander Popov authored -
Thanks to @kees
Alexander Popov authored -
Clip OS says that RANDOM_TRUST_BOOTLOADER and RANDOM_TRUST_CPU should be disabled if HW_RANDOM_TPM is enabled. The Clip OS description: Do not credit entropy included in Linux’s entropy pool when generated by the CPU manufacturer’s HWRNG, the bootloader or the UEFI firmware. Fast and robust initialization of Linux’s CSPRNG is instead achieved thanks to the TPM’s HWRNG. At the same time KSPP recommends to enable RANDOM_TRUST_BOOTLOADER and RANDOM_TRUST_CPU anyway: Get as much entropy as possible from external sources. The Chacha mixer isn't vulnerable to injected entropy, so even malicious sources should not cause problems. In this situation, I think kconfig-hardened-check should check only HW_RANDOM_TPM (there is no contradiction about it) and leave the decision about RANDOM_TRUST_BOOTLOADER and RANDOM_TRUST_CPU to the owner of the system.
Alexander Popov authored -
Thanks to @kees
Alexander Popov authored -
Thanks to @kees
Alexander Popov authored -
Alexander Popov authored
-
- 12 Oct, 2022 1 commit
-
-
Alexander Popov authored
-
- 09 Oct, 2022 9 commits
-
-
Alexander Popov authored
-
Alexander Popov authored
-
Clip OS description: it "will eventually be n".
Alexander Popov authored -
Alexander Popov authored
-
RANDOM_TRUST_BOOTLOADER and RANDOM_TRUST_CPU should be disabled if HW_RANDOM_TPM is enabled. The Clip OS description: Do not credit entropy included in Linux’s entropy pool when generated by the CPU manufacturer’s HWRNG, the bootloader or the UEFI firmware. Fast and robust initialization of Linux’s CSPRNG is instead achieved thanks to the TPM’s HWRNG.
Alexander Popov authored -
Disabling COREDUMP is needed for cutting userspace attack surface.
Alexander Popov authored -
Alexander Popov authored
-
These options are enabled by default.
Alexander Popov authored -
Alexander Popov authored
-
- 07 Oct, 2022 1 commit
-
-
Alexander Popov authored
-
- 02 Oct, 2022 8 commits
-
-
Alexander Popov authored
-
Alexander Popov authored
-
KASLR is enabled by default.
Alexander Popov authored -
Don't normalize this cmdline option.
Alexander Popov authored -
Alexander Popov authored
-
SMEP and SMAP are enabled by default.
Alexander Popov authored -
Alexander Popov authored
-
Alexander Popov authored
-
- 24 Sep, 2022 2 commits
-
-
Alexander Popov authored
-
Explanations from the Linux kernel commit 6a6155f664e31c9be43cd: When the kernel is compiled with Clang, -fsanitize=bounds expands to -fsanitize=array-bounds and -fsanitize=local-bounds. Enabling -fsanitize=local-bounds with Clang has the side-effect of inserting traps. That's why UBSAN_LOCAL_BOUNDS can enable the 'local-bounds' option only when UBSAN_TRAP is enabled.
Alexander Popov authored
-
- 18 Sep, 2022 1 commit
-
-
Android Open Source Project (AOSP): https://source.android.com/docs/setup/build/building-kernels Android Generic Kernel Image (GKI): https://source.android.com/docs/core/architecture/kernel/gki-release-builds Also add the GKI config `android13-5.10`. Thanks to @h0t for the idea.
Alexander Popov authored
-
- 02 Sep, 2022 9 commits
-
-
Alexander Popov authored
-
Alexander Popov authored
-
Alexander Popov authored
-
This script is still waiting for fixes from NixOS folks: Issue #63 PR #64
Alexander Popov authored -
Refers to the issue #71
Alexander Popov authored -
Alexander Popov authored
-
Refers to the issue #71
Alexander Popov authored -
Alexander Popov authored
-
Alexander Popov authored
-
- 23 Aug, 2022 1 commit
-
-
Alexander Popov authored
-